CVE-2023-43669Uncontrolled Resource Consumption in Tungstenite

Severity
7.5HIGHNVD
EPSS
3.2%
top 12.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 21
Latest updateJan 19

Description

The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/rust-tungstenite< rust-tungstenite 0.20.1-1 (forky)
crates.iosnapview/tungstenite0.0.0-00.20.1+1

Also affects: Fedora 37, 38, 39

Patches

🔴Vulnerability Details

6
GHSA
SurrealDB vulnerable to Uncontrolled CPU Consumption via WebSocket Interface2024-01-19
OSV
SurrealDB vulnerable to Uncontrolled CPU Consumption via WebSocket Interface2024-01-19
OSV
Tungstenite allows remote attackers to cause a denial of service2023-09-25
GHSA
Tungstenite allows remote attackers to cause a denial of service2023-09-21
OSV
Tungstenite allows remote attackers to cause a denial of service2023-09-21

📋Vendor Advisories

1
Debian
CVE-2023-43669: rust-tungstenite - The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a ...2023
CVE-2023-43669 — Uncontrolled Resource Consumption | cvebase